vuln-list-alt/oval/c9f2/ALT-PU-2020-1521/definitions.json
2024-06-28 13:17:52 +00:00

1201 lines
62 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201521",
"Version": "oval:org.altlinux.errata:def:20201521",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1521: package `chromium` update to version 80.0.3987.132-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1521",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1521",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-00867",
"RefURL": "https://bdu.fstec.ru/vul/2020-00867",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01341",
"RefURL": "https://bdu.fstec.ru/vul/2020-01341",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01434",
"RefURL": "https://bdu.fstec.ru/vul/2020-01434",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01452",
"RefURL": "https://bdu.fstec.ru/vul/2020-01452",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01453",
"RefURL": "https://bdu.fstec.ru/vul/2020-01453",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01460",
"RefURL": "https://bdu.fstec.ru/vul/2020-01460",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01476",
"RefURL": "https://bdu.fstec.ru/vul/2020-01476",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01477",
"RefURL": "https://bdu.fstec.ru/vul/2020-01477",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01479",
"RefURL": "https://bdu.fstec.ru/vul/2020-01479",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01483",
"RefURL": "https://bdu.fstec.ru/vul/2020-01483",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01487",
"RefURL": "https://bdu.fstec.ru/vul/2020-01487",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01489",
"RefURL": "https://bdu.fstec.ru/vul/2020-01489",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01493",
"RefURL": "https://bdu.fstec.ru/vul/2020-01493",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01495",
"RefURL": "https://bdu.fstec.ru/vul/2020-01495",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01498",
"RefURL": "https://bdu.fstec.ru/vul/2020-01498",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01502",
"RefURL": "https://bdu.fstec.ru/vul/2020-01502",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01503",
"RefURL": "https://bdu.fstec.ru/vul/2020-01503",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01506",
"RefURL": "https://bdu.fstec.ru/vul/2020-01506",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01509",
"RefURL": "https://bdu.fstec.ru/vul/2020-01509",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01511",
"RefURL": "https://bdu.fstec.ru/vul/2020-01511",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01518",
"RefURL": "https://bdu.fstec.ru/vul/2020-01518",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01519",
"RefURL": "https://bdu.fstec.ru/vul/2020-01519",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01522",
"RefURL": "https://bdu.fstec.ru/vul/2020-01522",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01748",
"RefURL": "https://bdu.fstec.ru/vul/2020-01748",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01911",
"RefURL": "https://bdu.fstec.ru/vul/2020-01911",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01967",
"RefURL": "https://bdu.fstec.ru/vul/2020-01967",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01968",
"RefURL": "https://bdu.fstec.ru/vul/2020-01968",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01969",
"RefURL": "https://bdu.fstec.ru/vul/2020-01969",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02034",
"RefURL": "https://bdu.fstec.ru/vul/2020-02034",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02857",
"RefURL": "https://bdu.fstec.ru/vul/2020-02857",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03818",
"RefURL": "https://bdu.fstec.ru/vul/2021-03818",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03846",
"RefURL": "https://bdu.fstec.ru/vul/2021-03846",
"Source": "BDU"
},
{
"RefID": "CVE-2019-18197",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19925",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19926",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10531",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6381",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6382",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6383",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6383",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6384",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6384",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6385",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6386",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6386",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6387",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6387",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6388",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6388",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6389",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6389",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6390",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6391",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6391",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6392",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6392",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6393",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6393",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6394",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6395",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6395",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6396",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6396",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6397",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6397",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6398",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6398",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6399",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6399",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6400",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6400",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6401",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6401",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6402",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6403",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6403",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6404",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6404",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6405",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6405",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6406",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6406",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6407",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6408",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6408",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6409",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6409",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6410",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6410",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6411",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6412",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6413",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6413",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6414",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6414",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6415",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6415",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6416",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6416",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6417",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6417",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6418",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6418",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6420",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6420",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6499",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6499",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6500",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6500",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6501",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6501",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6502",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6502",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 80.0.3987.132-alt1. \nSecurity Fix(es):\n\n * BDU:2020-00867: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01341: Уязвимость функции xsltCopyText (transform.c) библиотеки libxslt, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01434: Уязвимость функции flattenSubquery() системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01452: Уязвимость функции sqlite3WindowRewrite системы управления базами данных SQLite, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01453: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику оказать воздействие на целостность данных\n\n * BDU:2020-01460: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01476: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01477: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с чтение за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01479: Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01483: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01487: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01489: Уязвимость компонента AppCache браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01493: Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01495: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных\n\n * BDU:2020-01498: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01502: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных\n\n * BDU:2020-01503: Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01506: Уязвимость компонента SQLite браузера Google Chrome, связанная с чтением за границами буфера, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01509: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01511: Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01518: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01519: Уязвимость компонента SQLite браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01522: Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01748: Уязвимость функции zipfileUpdate() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01911: Уязвимость браузера Google Chrome, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01967: Уязвимость браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01968: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01969: Уязвимость компонента V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-02034: Уязвимость функции UnicodeString::doAppend (unistr.cpp) библиотеки International Components for Unicode, связанная с целочисленным переполнением структуры данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-02857: Уязвимость подсистемы media браузера Google Chrome, позволяющая нарушителю обойти политику безопасности контента\n\n * BDU:2021-03818: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности при помощи специально созданного доменного имени\n\n * BDU:2021-03846: Уязвимость службы Safe Browsing веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * CVE-2019-18197: In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.\n\n * CVE-2019-19923: flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n\n * CVE-2019-19925: zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n\n * CVE-2019-19926: multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n\n * CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.\n\n * CVE-2020-6381: Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6382: Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6383: Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6384: Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6385: Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2020-6386: Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6387: Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.\n\n * CVE-2020-6388: Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6389: Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.\n\n * CVE-2020-6390: Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6391: Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6392: Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6393: Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6394: Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6395: Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6396: Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6397: Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6398: Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6399: Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6400: Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6401: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6402: Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.\n\n * CVE-2020-6403: Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6404: Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6405: Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6406: Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6407: Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6408: Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.\n\n * CVE-2020-6409: Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.\n\n * CVE-2020-6410: Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.\n\n * CVE-2020-6411: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6412: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6413: Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.\n\n * CVE-2020-6414: Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6415: Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6416: Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6417: Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.\n\n * CVE-2020-6418: Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6420: Insufficient policy enforcement in media in Google Chrome prior to 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2020-6499: Inappropriate implementation in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass AppCache security restrictions via a crafted HTML page.\n\n * CVE-2020-6500: Inappropriate implementation in interstitials in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6501: Insufficient policy enforcement in CSP in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6502: Incorrect implementation in permissions in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-03-19"
},
"Updated": {
"Date": "2020-03-19"
},
"BDUs": [
{
"ID": "BDU:2020-00867",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-00867",
"Impact": "Low",
"Public": "20200224"
},
{
"ID": "BDU:2020-01341",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01341",
"Impact": "High",
"Public": "20191018"
},
{
"ID": "BDU:2020-01434",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01434",
"Impact": "High",
"Public": "20191209"
},
{
"ID": "BDU:2020-01452",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01452",
"Impact": "High",
"Public": "20191222"
},
{
"ID": "BDU:2020-01453",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01453",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01460",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01460",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01476",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01476",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01477",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01477",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01479",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01479",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01483",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01483",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01487",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-908",
"Href": "https://bdu.fstec.ru/vul/2020-01487",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01489",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01489",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01493",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01493",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01495",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01495",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01498",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01498",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01502",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01502",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01503",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01503",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01506",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01506",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01509",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01509",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01511",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01511",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01518",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01518",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01519",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01519",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01522",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01522",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01748",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-434",
"Href": "https://bdu.fstec.ru/vul/2020-01748",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "BDU:2020-01911",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01911",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01967",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01967",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01968",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01968",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01969",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01969",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-02034",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-02034",
"Impact": "High",
"Public": "20200312"
},
{
"ID": "BDU:2020-02857",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-358",
"Href": "https://bdu.fstec.ru/vul/2020-02857",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2021-03818",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2021-03818",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2021-03846",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2021-03846",
"Impact": "High",
"Public": "20200211"
}
],
"CVEs": [
{
"ID": "CVE-2019-18197",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
"Impact": "High",
"Public": "20191018"
},
{
"ID": "CVE-2019-19923",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "CVE-2019-19925",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-434",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "CVE-2019-19926",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
"Impact": "High",
"Public": "20191223"
},
{
"ID": "CVE-2020-10531",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531",
"Impact": "High",
"Public": "20200312"
},
{
"ID": "CVE-2020-6381",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6381",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6382",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6382",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6383",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6383",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6384",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6384",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6385",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6385",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6386",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6386",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6387",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6387",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6388",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6388",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6389",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6389",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6390",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6390",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6391",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6391",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6392",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6392",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6393",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6393",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6394",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6395",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6395",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6396",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6396",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6397",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6397",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6398",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6398",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6399",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6399",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6400",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6400",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6401",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6401",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6402",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6402",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6403",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6403",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6404",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6404",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6405",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6405",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6406",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6406",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6407",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6407",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6408",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6408",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6409",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6409",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6410",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6410",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6411",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6411",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6412",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6412",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6413",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6413",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6414",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6414",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6415",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6415",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6416",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6416",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6417",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6417",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6418",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6418",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6420",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6420",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6499",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6499",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6500",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6500",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6501",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6501",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6502",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6502",
"Impact": "Low",
"Public": "20200603"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201521001",
"Comment": "chromium is earlier than 0:80.0.3987.132-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201521002",
"Comment": "chromium-gnome is earlier than 0:80.0.3987.132-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201521003",
"Comment": "chromium-kde is earlier than 0:80.0.3987.132-alt1"
}
]
}
]
}
}
]
}